Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Size: px
Start display at page:

Download "Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security."

Transcription

1 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath University, Chennai, India senthil.analyst86@gmail.com Abstract Delay Tolerant Networks (DTNs) enable data transfer when mobile nodes are onlyintermittently connected. DTN routing usually follows store-carry-and-forward mechanism. Therefore,the willingness of nodes to relay messages for other nodes plays a significant role in the routing process.moreover, since the resources in mobile devices are generally limited, carriers of mobile devices maybe unwilling to relay messages for other nodes in order to conserve their scarce resources. Whenconsidering routing in DTNs, such selfish nodes have to be considered. Existing routing algorithmsdetects routing misbehavior can be caused by selfish nodes that are unwilling to spend resources suchas power and buffer on forwarding packets of others, or caused by malicious nodes that drop packets tolaunch attacks. To mitigate routing misbehavior by limiting the number of packets forwarded to themisbehaving nodes. Many challenges considers of selfishness of users who prefer to relay data forothers with strong social ties. Such social selfishness of users is a new constraint in network protocoldesign. Proposed work carries Social Selfishness Aware Routing (SSAR) algorithm to allow userselfishness and provide better routing performance in an efficient way. SSAR considers both users willingness to forward and their contact opportunity, resulting in a better forwarding strategy. Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security. Introduction Delay Tolerant Networking (DTN) is an approach to computer network architecture that aims to address the technical issues in heterogeneous networks that experience lack of continuous network connectivity. DTN enable data transfer when mobile nodes are only intermittently connected. Due to lack of consistent connectivity, DTN routing usually follow store-carry-and-forward. In Delay Tolerant Networks, selfish or malicious no desmay drop received packets. Selfishness in our context can be expressed in two ways. Firstly nodes may deny copying and storing data, which are of no interest to them and destined to a third node. Secondly even if they accept to acquire such data, they may refuse to infect another node with them, i.e. relay data to other nodes. To address the problem, this work has a distributed scheme to detect packet dropping. In this work, a node is required to keep a few signed contact records of its previous contacts, based on which the next contacted node can detect if the node has dropped any packet. Since misbehaving nodes may misreport their contact records to avoid being detected, a small part of each contact record is disseminated to a certain number of witness nodes, which can collect the appropriate contact records and detect them is behaving nodes. This scheme also consists of to mitigate routing misbehavior by limiting the number of packets forwarded to them is behaving nodes. Proposed SSAR is carried out to identify the nodes and performs efficient SSAR routing with its bandwidth capacity, contact opportunity, node willingness. Mitigation Misbehavior There are two types of nodes: misbehaving nodes and normal nodes. A misbehaving node drops the received packet seven if it has available buffers, but it does not drop its own packets. It may also drop the control messages of our detection scheme. Let us assume a small number of misbehaving nodes may collude to avoid being detected, and they may synchronize their actions via out-band communication channels. A normal node may drop packets when its buffer overflows, but it follows our protocol. In some DTN applications, each packet has a certain life time, and then expired packets should be dropped whether or not there is buffer space. Such dropping can be identified if the expiration time of the packet is signed by the source. Such dropping is not misbehavior. To detect misreporting, the contacted node also randomly selects a certain number of witnesses for the reported records and sends a summary of each reported record to them when it contacts them. When

2 two nodes contact, they generate a contact record which shows when this contact happens, which packets are in their buffers before data exchange, and what packets they send or receive during the data exchange. The record also includes the unique sequence number that each of them assigns for this contact. The record is signed by both nodes for integrity protection. A node is required to carry the record of its previous con tact, and report the record to its next contacted node, which will detect if it has dropped packets since the previous contact. The misbehaving node in Figure 1.1 is required to generate a contact record during each contact and report its previous contact record to the contacted node. Based on there ported contact records, the contacted node detects if the misbehaving node has dropped packets. The misbehaving node may misreport to hide its misbehavior, but forged records cause inconsistencies which make misreporting detectable. Figure 1.1:Misbehaving node Detection. To detect misreporting, the contacted node also randomly selects a certain number of witness nodes for the reported records and sends a summary of each reported record. The witness node W that collects two inconsistent contact records can detect them is reporting node nodes for the reported records and sends a summary of each reported record to them when it contacts them. The witness node that collects two inconsistent contact records can detect the misreporting node. Misreporting Node Detection To hide the dropping from being detected by the next contacted node, will not report the true record of the previous contact. However, when there is no collusion, cannot modify the true record since it is signed by the previous contacted node. Also, cannot forge a contact record because it does not know the private key of any other node. Thus, the only misreporting it can perform is to replay an old record generated before the previous contact. This misreporting is referred to as replay record. Note that other types of misreporting are possible when collusions exist. Detection To detect the inconsistency caused by misreporting, for each contact record generated and received in a contact, a node selects W random nodes as the witness nodes of this record, and transmits the summary of this record to them when it contacts them. It selects the witness nodes from the nodes that it has directly contacted. In this manner, each node can collect some record summaries for which its a witness. When it receives a new summary, it checks the summary against the already collected summaries signed by the same node to see if the signer has violated any of the two consistency rules. If a violation is detected, then it further verifies the signatures included in the inconsistent summaries. If the signature verification succeeds, the signer is detected as misreporting. ALARM After detection, the witness node floods an alarm to all other nodes. The alarm includes the two inconsistent summaries. When a node receives this alarm, it verifies the inconsistency between the included summaries and the signature of the summaries. If the verification succeeds, this node adds the appropriate misreporting node into a blacklist and will not send any packets to it. If the verification fails, the alarm is discarded and will not be further propagated. A misreporting node will be kept in the blacklist for a certain time before being deleted. In this each node detects packet dropping locally based on the collected information. Moreover, the detection scheme an effectively detect misreporting even when some nodes collude. To mitigate routing misbehavior, we tryto reduce the number of packets sent to the misbehaving nodes. If a node is detected to be misreporting, it should be blacklisted and should not receive packets from others. However, if a misbehaving node does not misreport, we cannot simply blacklist it because it is dropping packets, since a normal node may also drop packets due to buffer overflow. In the following, we focus on how to mitigate routing misbehavior without affecting normal nodes too much when misbehaving nodes do not misreport. The detection scheme works in distributed way; i.e., each node detects packet dropping locally based on the collected information. Moreover, the detection scheme can effectively detect misreporting even when some nodes collude. Analytical results on detection probability and detection delay were also presented. Based on our packet dropping detection scheme, this scheme to mitigate routing misbehavior in DTNs.

3 Proposed Work In the proposed work the selfish node forward packets for nodes with which they have social ties but not others, and such willingness varies with the strength of the social tie. Proposed work carries a Social Selfishness Aware Routing (SSAR) algorithm to cope with user selfishness and provide good routing performance in an efficient way. To select ineffective forwarding node, SSAR considers both users willingness to forward and their contact opportunity, and derives a metric with mathematical modeling and machine learning techniques to measure the forwarding capability of the mobile nodes. SSAR allows users to maintain selfishness and achieves good routing performance with low transmission cost. SSAR As being selfish, they are unwilling to forward packets for those with whom they have no social ties in order to save their own storage and power resources. For convenience, the above social and selfish behavior will be referred to as social selfishness. Social selfishness has not been addressed before. It will not work well since some packets are forwarded to nodes unwilling to relay, and will be dropped. The selfish side of users, where selfish nodes are stimulated to forward packets for all other nodes to maintain high-performance. However, these schemes go to another extreme; i.e., it assumes that a node is not willing to forward packets for anyone else. For convenience, such selfishness is called individual selfishness. Social Selfishness Aware Routing(SSAR) protocol, in which a node only forwards packets for those with social ties, and it gives priority to packets received from those with stronger social ties when there are not enough resources. Since each node only forwards packets for part of the nodes, it is important to know how this will affect the routing performance. To achieve high performance, SSAR considers both user willingness and contact opportunity when selecting relays. It combines the two factors through mathematical modeling and machine learning techniques, and obtains a new metric to measure the forwarding capability of a relay. With SSAR, a packet will most likely before warded to the relay that has strong willingness to forward as well as high direct or indirect/transitive contact opportunity with the destination. Social selfishness but also try to maintain good routing performance under social selfish behavior. Social selfishness is a kind of user demand that should be satisfied. Willingness Table Each node maintains a table that contains its willingness values for other nodes in the network. In this table, each item has the format of [node ID, value i]. The value of willingness is a real number within [0, 1], where0 means unwilling to forward and 1 means the most willing to forward. A node s willingness value for another node depends on the social tie between them. The stronger the social tie is, the larger the willingness is. Node only needs to setits willingness value for each other user with whom it has a social tie, and set a default willingness value (e.g., 0) for all other (possibly unknown) nodes without any social tie. Protocol Description i). After neighbor discovery, node N and M deliver packets destined to each other in the decreasing order of priority. ii). Suppose M still buffers some other packets. Then M sends N a summary list of h sourced, destination ID, expiration time, priority for these packets. iii). From the source ID and priority information, N calculates the new priority value for each packet in the list. Based on the new priority, the destination ID and expiration time, N calculates its delivery probability and available buffer size for each packet, and returns them to M.iv). M determines a candidate set of packets for which N has higher delivery probabilities. v). considering the available buffer size information, M further decides which candidates to transmit by solving the MKPAR formulation. Packet Priority When a node receives a packet from a previous hop, it assigns a priority to the packet. The priority determines if this node will relaythe packet (i.e., the priority is positive) or not(i.e., the priority is zero). To be socially selfish, the node only forwards the packet if it is from anode with a social tie. There are two cases: First, the source of the packet has a

4 social tie with this node, and hence forwarding the packet means helping the source. Second, the previous hop has a social tie with this node, no matter the source has a social tie or not. In this case, the previous hop has taken over the responsibility (probably from its own social tie) to deliver the packet. Thus, even if the source does not have a social tie with this node, this node should still relay the packet to help the previous hop. Actually, this is motivated by the real-world phenomenon that people usually would like to help a friend s friend. The priority should also measure the social importance of the packet to this node. For example, when other conditions are the same, packets from the node with a stronger social tie should have a higher priority. Let Pcurr denote the new priority of a packet in the current hop, and Pprev denote theold priority of the packet in its previous hop. Let ωsrc and ωprev denote the current hop s willingness for the packet source and the previous hop, respectively. Then the current hop calculates the new priority in the following ways (Note that the initial priority of a packet is set as 1 by the source node.): i). If neither the source nor the previous hophas a social tie with the current hop, then Pcurr = 0. ii). If the source has a social tie but the previous hop does not, then Pcurr = ωsrc. iii). If the previous hop has a social tie but the source does not, then Pcurr = Pprev.ωprev. iv). If both the source and the previous hop have a social tie with the current hop, v). Pcurr = max {ωsrc, Pprev.ωprev}. The priority assignment method and the buffer management policy can enforce social selfishness. Packets that traverse different social links will receive different forwarding service. SSAR allows users to behave in the socially selfish way and improves performance by considering user willingness, resource constraints, and contact opportunity when selecting relays. SSAR s gain in packet delivery ratio and cost does not come for free its packet delivery delay is longer, because it does not forward packets to the relays that have a good contact opportunity but low willingness. However, the packets forwarded to these relays also have a high risk of being dropped due to the low willingness. Buffer Manager A node manages buffers based on packet priority: (i) Packets with priority 0 will not be buffered; (ii) When buffer overflows, packets of low priority are dropped first. The second rule indicates that a new incoming packet can preempt the buffer occupied by a lower-priority packet. The buffer policy together with the priority assignment method allows nodes to be socially selfish. Delivery Probability Estimator It estimates a node s delivery probability for a packet, which is used to mea-sure the node s forwarding capability for that packet. When two nodes are in contact, each packet is for-warded from the node with a lower delivery probability to the node with a higher delivery probability. Traditionally, the quality of a relay is measured solely based on contact opportunity, which can be the relay s direct contact opportunity to the destination node or the transitive contact opportunity provided by the relay s contacted nodes or both. SSAR measures the delivery probability of a node based on both of its contact opportunity to the destination and its willingness to forward. It is straightforward that a node with a low contact opportunity should not be a relay. Interestingly, a node with a high contact opportunity but low willingness should not be a relay either. Conclusion In this work we have studied the problem of data dissemination in delay tolerant networks. By considering selfish nodes with social behavior, In this existing work, using summary report the witness node detects packet dropping in DTNs. The detection scheme works in a distributed way. i.e., each node detects packet dropping locally based on the collected information. Moreover, the detection scheme can effectively detect misreporting even when some nodes collude. But this will not route through the selfish node. But the Social Selfishness Aware Routing (SSAR) protocol allows social selfishness and provides better routing performance in an efficient way. SSAR allocates resources such as buffers and bandwidth based on packet priority which is related to the social relationship among nodes. To maintain the routing performance, SSAR will quantify the relay s willingness to evaluate its forwarding capability and thus reduces the packet dropping rate. References [1] Bin Chen, Mun Choon Chan. A Credit- Based Incentive System for Disruption Tolerant Network. IEEE Infocom, [2] Boldrini, M. Conti, A. Passarella, Content place: social-aware data dissemination inopportunistic networks, in: Proc. MSWiM,2008. [3] E. Bulut and B. K. Szymanski, Friendship Based Routing in Delay Tolerant Mobile Social Networks, in Proc. of IEEE GLOBECOM, [4] E. Daly and M. Haahr, Social Network Analysis for Routing in Disconnected

5 Delay-Tolerant MANETs, Proc. ACM Mobi Hoc, [5] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, Maxprop: Routing for Vehicle based disruption Tolerant Networks, in Proc. IEEE INFOCOM,2006. [6] K. Fall, A Delay-Tolerant Network Architecture for Challenged Internets, in conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM 03. [7] K. Scott, S. Burleigh, Bundle Protocol Specification, IETF Network Working Group, November 2007.[8].Lindgren, A. Doria, and O. Schelen, Probabilistic routing in intermittently connected networks, ACM SIGMOBILECCR, [8] Mei and J. Stefa, Give2get: Forwarding in social mobile wireless networks of selfish individuals, in Distributed Computing Systems (ICDCS), 2010 IEEE 30 th International Conference on, 2010, [9] S. Jain, et al., Routing in Delay Tolerant Network, ACM SIGCOM 04, Portland, Oregon, 2004

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Ad Hoc Networks 10 (2012) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 10 (2012) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks 10 (2012) 1619 1632 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc A routing protocol for socially selfish delay tolerant

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Social Properties Based Routing in Delay Tolerant Network

Social Properties Based Routing in Delay Tolerant Network RESEARCH ARTICLE OPEN ACCESS Properties Based Routing in Delay Tolerant Network Aliasger k. Dhilawala 1, Vishal shah 2 1 (Computer Department, S.V.I.T, Vasad,India 2 (Computer Department, S.V.I.T, Vasad,India

More information

Trust Management for Encounter-Based Routing in Delay Tolerant Networks

Trust Management for Encounter-Based Routing in Delay Tolerant Networks Trust Management for Encounter-Based Routing in Delay Tolerant Networks Ing-Ray Chen, Fenye Bao, Moonjeong Chang Department of Computer Science Virginia Tech {irchen, baofenye, mjchang}@vt.edu Abstract:

More information

Integrated Routing Protocol for Opportunistic Networks

Integrated Routing Protocol for Opportunistic Networks Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,

More information

SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks

SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks IEEE GLOBECOM 2011 - Communication & System Security 1 SATS: Secure Data-Forwarding Scheme for Delay-Tolerant Wireless Networks Mohamed Elsalih Mahmoud, Mrinmoy Barua, and Xuemin (Sherman) Shen Department

More information

hash chains to provide efficient secure solutions for DSDV [7].

hash chains to provide efficient secure solutions for DSDV [7]. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18,   ISSN International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer

More information

Routing in Delay Tolerant Networks (DTN)

Routing in Delay Tolerant Networks (DTN) Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

Incentive-Aware Routing in DTNs

Incentive-Aware Routing in DTNs Incentive-Aware Routing in DTNs Upendra Shevade Han Hee Song Lili Qiu Yin Zhang The University of Texas at Austin IEEE ICNP 2008 October 22, 2008 1 DTNs Disruption tolerant networks No contemporaneous

More information

Opportunistic routing to forgo flooding attacks in MANET

Opportunistic routing to forgo flooding attacks in MANET Opportunistic routing to forgo flooding attacks in MANET 1 Elakkiya.M, 2 Dr.Edna Elizabeth.N, 1 PG Student, 2 Professor 1 Dept of ECE, SSN college of Engineering, Chennai, India 2 Dept of ECE, SSN college

More information

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network

An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network An Analysis of Dynamic Delay Tolerant Network Strategies for Preventing Selfish Behavior Network K. Aravindha 1, A. Senthil Kumar 2 Research Scholar, Asst. Professor, Dept. of Computer Science, Tamil university,

More information

Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing

Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing 1 Multicent: A Multifunctional Incentive Scheme Adaptive to Diverse Performance Objectives for DTN Routing Kang Chen, Student Member, IEEE, Haiying Shen*, Senior Member, IEEE, Li Yan Abstract In Delay

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

AN AD HOC NETWORK is a group of nodes without requiring

AN AD HOC NETWORK is a group of nodes without requiring 2260 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 12, DECEMBER 2005 Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks Wei Yu, Student Member, IEEE, and K. J. Ray

More information

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion ABSTRACT Communication is usually done through means of network where there is a lot of intrusion included to it. In order to detect the misbehavior, there should an effective strategy, which is capable

More information

International Journal On Engineering Technology and Sciences IJETS ISSN (P): , ISSN (O): Volume 1 Issue 1, May 2014

International Journal On Engineering Technology and Sciences IJETS ISSN (P): , ISSN (O): Volume 1 Issue 1, May 2014 SHIELDING IN CONTRAST TO FLOOD ATTACKS IN DISRUPTION TOLERANT NETWORKS VANDANA S, Dr.S.M.NANDHAGOPAL.,M.E.Ph.D., PG SCHOLAR, II-M.E (CSE), EASA COLLEGE OF ENGINEERING AND TECHNOLOGY NAVAKKARAI COIMBATORE-105

More information

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK Ms.Yogita Y.Bhosale*, Prof.Nilesh R.Pardeshi * Department of Computer

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT

INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS. Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT INNOVATIVE SCIENCE AND TECHNOLOGY PUBLICATIONS Manuscript Title A PACKET DROPPING ATTACK DETECTION FOR WIRELESS AD HOC NETWORK USING KEY MANAGEMENT 1 P.S.Kirthana, 2 Yasotha B.E.,M.Tech., P.G Scholar,

More information

Nodes Misbehavior in Vehicular Delay-Tolerant Networks

Nodes Misbehavior in Vehicular Delay-Tolerant Networks Nodes Misbehavior in Vehicular Delay-Tolerant Networks Naércio Magaia, Paulo Rogério Pereira, Miguel P. Correia INESC-ID/IST/UTL, Rua Alves Redol, 9. 1000-029 LISBOA, Portugal {naercio.magaia, miguel.p.correia}@ist.utl.pt,

More information

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department

More information

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Security Enhancement

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

2015, IJARCSSE All Rights Reserved Page 133

2015, IJARCSSE All Rights Reserved Page 133 Volume 5, Issue 11, November 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

FRIEND CIRCLE AND SOCIAL FEATURE-BASED ROUTING IN OPPORTUNISTIC MOBILE SOCIAL NETWORKS. Rahul Narendrasing Girase

FRIEND CIRCLE AND SOCIAL FEATURE-BASED ROUTING IN OPPORTUNISTIC MOBILE SOCIAL NETWORKS. Rahul Narendrasing Girase FRIEND CIRCLE AND SOCIAL FEATURE-BASED ROUTING IN OPPORTUNISTIC MOBILE SOCIAL NETWORKS by Rahul Narendrasing Girase A thesis submitted to the Graduate Council of Texas State University in partial fulfillment

More information

Store-and-Forward Performance in a DTN

Store-and-Forward Performance in a DTN Store-and-Forward Performance in a DTN Mooi-Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng Department of Computer Science and Engineering Lehigh University 19 Memorial Drive West, Bethlehem, PA 18015,

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM

More information

DTN Routing in Vehicular Sensor Networks

DTN Routing in Vehicular Sensor Networks DTN Routing in Vehicular Sensor Networks Xu Li, Wei Shu, Minglu Li, Hongyu Huang and Min-You Wu Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China Department

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Trust-Threshold Based Routing in Delay Tolerant Networks

Trust-Threshold Based Routing in Delay Tolerant Networks Trust-Threshold Based Routing in Delay Tolerant Networks MoonJeong Chang 1, Ing-Ray Chen 1, Fenye Bao 1, and Jin-Hee Cho 2 1 Department of Computer Science, Virginia Tech, 7054 Haycock Road, Falls Church,

More information

Using local speed information as routing metric for delay tolerant networks

Using local speed information as routing metric for delay tolerant networks Using local speed information as routing metric for delay tolerant networks FUQUAN ZHANG 1, INWHEE JOE, DEMIN GAO 1 AND YUNFEI LIU 1 1 College of Information and Sciences NanJing Forestry University NanJing

More information

Hybrid Routing Scheme for Vehicular Delay Tolerant Networks

Hybrid Routing Scheme for Vehicular Delay Tolerant Networks Hybrid Routing Scheme for Vehicular Delay Tolerant Networks Sayed Fawad Ali Shah 1, Mohammad Haseeb Zafar 1,2, Ivan Andonovic 2 and Tariqullah Jan 1 1 Department of Electrical Engineering, University of

More information

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network

Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network Dhiraj kr. Mishra * M.Tech,

More information

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet K. Swathi Research Scholar, Dept of computer science, Sri Ramakrishna College of Arts & Science for Women Coimbatore-

More information

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant

More information

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2 www.ijcsi.org 365 Computing Conditional Intermeeting Time in Conditional Shortest Path Routing Saravanan.A 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application,

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:

More information

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance

More information

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Mitigating Routing Misbehavior in Mobile Ad Hoc Networks S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in The 6th ACM International Conference on Mobile

More information

Max-Pivot Routing for Opportunistic Networks

Max-Pivot Routing for Opportunistic Networks Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types

More information

Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr.

Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr. Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc 2009 Presentor: Mingyuan Yan Advisor: Dr. Yingshu Li 1 2 3 4 5 Introduction Problem definition Single-data multicast

More information

A Light Weight Payment Report Scheme for Multihop Wireless Networks

A Light Weight Payment Report Scheme for Multihop Wireless Networks A Light Weight Payment Report Scheme for Multihop Wireless Networks S. Suganya, Department of CSE(PG Scholar), Kathir College of Engineering, Neelambur,Coimbatore. Dr. M. Sadish Sendil, Head of the Department

More information

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications 1 Shankar B Sajjan, 2 Amit Kumar, 3 Masrath Begum, 4 Ambrish Kaneri 1234 Assistant Professor, CSE

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (215 ) 1367 1375 3rd International Conference on Recent Trends in Computing 215 (ICRTC-215) Location Information and

More information

Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management

Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management Efficiency Analysis of Enhanced Epidemic Routing Protocol of Delay Tolerant Networks using Improved Buffer Management 195 Abstract Assistant Professor, Department of IT, MIMIT Malout. Bindra.harminder@gmail.com

More information

Cooperation in Mobile Ad Hoc Networks

Cooperation in Mobile Ad Hoc Networks Cooperation in Mobile Ad Hoc Networks Jiangyi Hu Computer Science Department Florida State University January 11, 2005 Abstract In this report we consider selfish node behavior in ad hoc networks and discuss

More information

Center for Networked Computing

Center for Networked Computing Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No

More information

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo

More information

Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording

Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording Yanzhi Ren, Mooi Choo Chuah,JieYang, Yingying Chen Dept. of ECE, Stevens Institute of Technology Dept. of CSE,

More information

Secure and Reliable Ad-Hoc on Demand Multipath Distance Vector Routing Protocol for Mobile Ad Hoc Networks

Secure and Reliable Ad-Hoc on Demand Multipath Distance Vector Routing Protocol for Mobile Ad Hoc Networks 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Secure and Reliable Ad-Hoc on Demand Multipath Distance Vector Routing Protocol for

More information

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks BHARAT.VEERLA *1, and SREERAMA MURTHY #2 * Student, Dept of CSE, Sree Vahini Institute of Science and

More information

Routing in Large-Scale Buses Ad Hoc Networks

Routing in Large-Scale Buses Ad Hoc Networks 1 Routing in Large-Scale Buses Ad Hoc Networks Michel Sede, Xu Li *, Da Li *, Min-You Wu * Laboratory for Computer Communications and Applications, EPFL, Switzerland * Department of Computer Science and

More information

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

A DTN Packet Forwarding Scheme Inspired by Thermodynamics A DTN Packet Forwarding Scheme Inspired by Thermodynamics Mehdi Kalantari and Richard J. La Department of Electrical and Computer Engineering University of Maryland {mehkalan, hyongla}@umd.edu Abstract

More information

ROUTING IN DELAY TOLERANT NETWORKS

ROUTING IN DELAY TOLERANT NETWORKS ROUTING IN DELAY TOLERANT NETWORKS A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Bachelor of Technology in Computer Science and Engineering By Md. RAIYAN ALAM Roll: 108CS024

More information

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 14 Version 1. Year 212 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,

More information

Mooi-Choo Chuah* and Peng Yang

Mooi-Choo Chuah* and Peng Yang Int. J. Ad Hoc and Ubiquitous Computing, Vol. 4, No. 5, 2009 269 Context-aware multicast routing scheme for Disruption Tolerant Networks Mooi-Choo Chuah* and Peng Yang Department of Computer Science and

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,

More information

INTERNATIONAL JOURNALOF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNALOF RESEARCH SCIENCE & MANAGEMENT AN ENHANCED CROSS LAYER SCHEME FOR BACK OFF ATTACK AND NETWORK LAYER MISBEHAVIOR DETECTION IN MANET R. Kumaran* 1 & K P K Devan 2 Department of Computer Science and Engineering, Easwari engineering college

More information

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs : Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Custodial Multicast in Delay Tolerant Networks

Custodial Multicast in Delay Tolerant Networks Custodial Multicast in Delay Tolerant Networks Challenges and Approaches Susan Symington, Robert C. Durst, and Keith Scott The MITRE Corporation McLean, Virginia susan@mitre.org, durst@mitre.org, kscott@mitre.org

More information

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Prof. SmitaShukla Patel 1, Dr. M.Mohanpriya 2 1 Computer Science Department,Karpagam University,India 2 Computer Science

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information